General

  • Target

    3048-11-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    8c1f60f6044cac1673cf268b908458eb

  • SHA1

    11b364df87d5590981f71df4f0942d92cc1ee508

  • SHA256

    8c6b01ce8a85f5f28614111a16e3ae8cb2dd6063660f674f00922473c2ce5da3

  • SHA512

    a59788dd7fa18b4d5918cacc54ff7a02c44d088791206d1ef5cb6e3cff75119b847efbe5603e144c0f6ecb5f15df2941f905bc8a73aef79b757a12932ff9fce8

  • SSDEEP

    3072:L8FdHymSuCUDDbMQJKlyjWjTOhJ5CW9dvt2LEPXH:adHymSuCUDDbMQJ0BqhHdv8L

Score
10/10

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7225809616:AAEt7H1sHiGor6_FJDBNVWoXF_3jTIBVboA/

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3048-11-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections